skip to main content
column
Free Access

Risks and myths of cloud computing and cloud storage

Published:23 September 2014Publication History
Skip Abstract Section

Abstract

Considering existing and new types of risks inherent in cloud services.

References

  1. Gligor, V. Security limitations of virtualization and how to overcome them. Security Protocols Workshop, SPW 2010, Cambridge, U.K., 2010.Google ScholarGoogle Scholar
  2. McMillan, R. Cloud computing a security nightmare, says Cisco CEO. Computerworld; http://www.computerworld.com/s/article/9131998/Cloud_computing_a_security_nightmare_says_Cisco_CEO.Google ScholarGoogle Scholar

Index Terms

  1. Risks and myths of cloud computing and cloud storage

            Recommendations

            Reviews

            De Wang

            This article focuses on risks in cloud computing when designing, selecting, and configuring cloud services. Cloud computing has brought many benefits, such as low cost and simple management. However, it also comes with many risks, including old ones such as lack of integrity, accountability, and trustworthiness, and also insider misuse. And there are new risks as well. For example, “the scale and distributivity of some of the clouds” is questionable. Security and privacy in the cloud is an open problem to the research community. Especially, as more and more personal or sensitive data is stored in the cloud due to the large scale, people have more concerns about information leaks and privacy issues. Information scandals related to the cloud have also happened recently, which further proves the existing privacy risks with cloud computing. I totally agree with the author's opinions. People may ignore the risks when dealing with cloud services. This article is a good reminder of the serious risks they may face now or in the near future. We need to be more cautious about cloud computing since many risks have not yet been fully addressed. Online Computing Reviews Service

            Access critical reviews of Computing literature here

            Become a reviewer for Computing Reviews.

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 57, Issue 10
              October 2014
              99 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/2661061
              • Editor:
              • Moshe Y. Vardi
              Issue’s Table of Contents

              Copyright © 2014 Copyright is held by the owner/author(s)

              Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 23 September 2014

              Check for updates

              Qualifiers

              • column
              • Popular
              • Un-reviewed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format